Showing posts with label whistleblowers. Show all posts
Showing posts with label whistleblowers. Show all posts

Wednesday, July 24, 2013

THE SECRET INGREDIENT: HYPOCRISY


If hypocrisy were oil, Washington would be Saudi Arabia.  But even by the standards of a town where disingenuousness and moral falsity frame also every public discussion, President Obama’s spokesman Jay Carney yesterday blew smoke fouler than the air in a Chinese coal mine.

“We oppose the current effort in the House to hastily dismantle one of our Intelligence Community’s counterterrorism tools,” said Carney, specifically ignoring the zeal in the Democrat’s house, the Senate, to demand changes, limits, and procedures that would certainly re-mantle the Federal Government’s universal surveillance system.

But here’s the Big Hoot:  “This blunt approach,” Carney went on, “is not the product of an informed, open or deliberative process.”

So true!  But whose fault is that?  Why, I believe it is no one other than the Press Secretary’s boss, President Barack Obama.

Until Edward Snowden spilled to Glen Greenwald in The Guardian, and later, the Washington Post, the extent of telephone, snail and email, cellphone, GPS record-keeping underway at the National Security Agency, President Obama was zealously protecting keeping all the secrets of that cuddly “Intelligence Community.”  (Anybody ever hear references to a Health and Welfare Community?  Even though they deal, literally, with community concerns.  Education community? Housing community?  Yes, it is common to invoke the Defense Community, because, it, too, like Intelligence, benefits from painted on warm and fuzzies.)

Before Snowden, all the American people were allowed to know came from some, dare I call them “cryptic” hints from a couple of well-briefed Senators, and important whistleblower coverage of phone-record-napping in the NY Times and elsewhere.  That should have alerted the public that traceable digital systems, not just phones, but computers, and GPS connectors could, and therefore were likely to be scanned for Big Data.

That the snoops are also clocking postal communications seems so “last century,” that it caught me by surprise. It shouldn’t have.  Surveillance covers all, or it’s almost nothing at all.    

That’s why turning off parts of the surveillance machine won’t work.

What will work is rule of law, covering the whole damn surveillance system, what the people’s representatives will legislate as limits, not on data collection – a blind eye sees no dangers, but on data selection: what triggers actually examining a person’s collected data, and who gets to do the examining? Is some form of warrant needed before selection can begin, and what level of cause will be required to obtain one?  Will anyone argue on behalf of privacy? What parts of a person’s data can be examined?  Who monitors the process to see that set limits are respected, that every search doesn’t simply strip-mine personal data? And who has oversight over the monitors, and how much are they allowed to share with the public?

These are all difficult, subtle, and vitally important questions.  A Congress which having taken its feet from their normal resting spot in their mouths, should not now use them to out-run their brains.  Carney and his boss are right about that. 

Information, deliberation and openness will all be required if Americans are to exercise any influence on perhaps the most important legal and political decisions of our time. But it ill behooves the man who has smothered all of them, either because he uncritically trusts the men and systems whose secrets he’s been hiding from voters, or because he mistrusts the wisdom of those citizens and finds it safer compulsively to cover his ass, to say so.

Let’s not forget that the most flagrant known examples of abuse of surveillance data come from the Obama Justice Department’s pursuit of phone records of journalists at Fox News, CBS News and the Associated Press who were working on revelations, not of strategic secrets, but of undisclosed CIA and State Department ineptitude and dishonesty.

You know the kind of thing, like that Attorney General Eric Holder was Bill Clinton’s end-of-term-pardon go-between (and might one guess, in the usually politically correct, indirect way, bagman?) with the convicted fugitive billionaire Marc Rich.  That was supposed to be a secret, too.

This of the embarrassment President Clinton and then Deputy AG Holder might have saved themselves with a little information, deliberation and openness, even at the cost of a crook’s Get Out of Jail Free card, and whatever it might have produced.

 

   

Tuesday, July 9, 2013

PRIVACY AND SECRECY


The “debate” over PRISM and other American and international snooping programs grows more pathetic by the day, still dominated by laments over these “evil” new technologies of data gathering and collation.

The latest “highlight” was conservative columnist Robert Samuelson’s regretting the invention of the Internet.  This is the return of the mad Irish King Cuchulainn cursing the ocean’s waves.

The Internet, with all its dangers and opportunities is here, Bob; get over it.  Or better, learn to manage it.

The same must be said for today’s new surveillance technology: it exists, and any national security agency that fails to use it should be disbanded.  The question is how are these new opportunities to monitor people and their communications used by the NSA, its colleagues and competitors.  It is a given that they can and do register and file just about every form and piece of human communication.  But, what triggers more particular and invasive attention to people or institutions?  And once closer looks are begun, who gets access to selected materials?  Who monitors the snoopers from both inside and outside the system, and what powers do they have to rein in irresponsible or unnecessary prying?  And who tells what about all of this to the people who, in a democracy, should have the ultimate power and responsibility?

These are hard questions, but familiar ones, since they recur often, whenever the balance of power between citizens and their states is transformed by technological or cultural change.

In this case, the ongoing development of surveillance technology and data gathering and mining, like the ongoing development of global use of the Internet creates both dangers and opportunities for both sides of the citizen/state balance of power.

On the one hand, for the 21st Century and beyond, the uncomfortable fact is that personal privacy is dead, and not just because of government supercomputers. The global distribution of mobile phones with audio or video recording capabilities has created an environment in which anything that happens “in public” is almost as likely to be recorded as your “private” phone calls, texts messages, snail- and e-mails, and probably more likely to be distributed with or without your permission.

But, there is a countervailing truth here: government secrecy is as almost as dead as privacy; people have never-before-equaled powers to rip the government’s blindfolds off their eyes.  The fatal flaw of secret systems, that they require human participation, and inevitably, every secret decision can produce active dissent, is nothing new.  But what is new and growing is the ability of whistleblowers to record events, and to distribute the recordings and their dissident criticisms to the world at large. Thus, what really be created is a new and different balance of powers between citizens and states, uneasy, instable, but still a balance of powers.

And the evidence suggests, people have already begun adapting to this new balance.  Even old folks like me have noticed that younger people have different attitudes toward and expectations for privacy.  They are prone to exhibit more of and about themselves than their parents did. Largely this is because they can; but it also because others can create these displays, with little to stop them, and that such exposures create far less embarrassment or social cost.  Note the political returns of Eliot Spitzer, Anthony Weiner and Mark Sanford, just to name 3.  Every college newspaper, it seems, has either a sex or a porn column, which trade in what even fairly recent graduates might consider TMI, too much information.

This is not to say, there are no norms, but just to note that, for most people under 30 the limits on personal disclosure are looser than for older people.  When it comes to the NSA snoopers, the key task will be to determine the norms, not on what you can do, but on what you can do without inviting real surveillance.  If you can fly beneath that radar, and would-be terrorists have long known this and did not need Edward Snowden to tell them to be careful, you can do almost anything you want, until it is too late for even the most aware parents, potential employers or professional counter-terrorists to prevent it.

So, Norms for Our Time:  when you are on the phone or the Internet, assume your every move is being turned into government data, and when you are on the street or anywhere “in public,” assume there is a good possibility everything you say or do is being recorded. 
That’s relatively easy.  Personal and cultural change is constant and people are used to dealing with it.  Much harder is to define and apply rules and limits to powerful institutions like governments and their often-loosely- supervised security agencies.  They are much slower to understand, and much, much slower to adapt to new conditions than people.

After all, it has been 50 years since the US sent troops into Vietnam, and still there has been little recognition of how changes in communications and weapon technologies have made military invasion an exercise in futility.  The universality of digital communication is one key reason why old war-fighting tactics no longer work, and why local organizations cohere so successfully and durably.  The rapid escalation in portable or “improvised” (i.e. locally sourced) firepower is another.  Taken together, these changes explain why, as I like to put it, “In today’s warfare, the visiting team never wins.” 

Gone are the days of “secret wars.”  If a sparrow, much less a bomb falls, the destruction it causes will be publicly known via Twitter, Facebook and supremely, YouTube, not just by the home folks suffering the damage, who will inevitably be alienated from the outside forces responsible for it, but by the “visitors’ own citizens, who will know what death and destruction are being committed in their names. 

Increasingly, Americans are coming to understand that for every terrorist (in, or without quotation marks) killed by American drones in northwest Pakistan, hundreds of friends, relatives and neighbors, and hundreds of thousands of Pakistani fellow-citizens are turned into irrevocable enemies.  They can see the damage on their TV screens, computers and mobile phones. 

Similar secret US attacks inside Somalia, may have eliminated a few terrorists, but they have also strengthened the Islamist terrorist group Al-Shabaab’s legitimacy as an anti-imperialist force there.  Somalis, like Pakistanis, count the collaterally dead as their friends, those who killed them as enemies, and today’s communications technologies assure they, and anyone they can communicate with, can count corpses as easily or efficiently as domestic spooks can track your correspondence.  American diplomats on the ground recognize this blowback, but in Washington, other imperatives still rule.


Between whistleblowers and video cameras, government secrecy is dead as a doornail, or the concept of personal privacy.  The Video Era, like those of such earlier modes of communication as the human voice, the printing press, radio and TV, has created great opportunities for the consolidation of power in those who can control or best utilize those media.  But, equally, for ordinary people the new media, each time they change the world, also greatly empower individual communications to spread farther faster to an ever-growing audience. 

There is a new balance of power in communication and, as Darwin noted, adaptation is the only answer. 

David Marash